| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: ruby | Distribution: AlmaLinux |
| Version: 3.0.7 | Vendor: AlmaLinux |
| Release: 166.el9_7 | Build date: Tue May 19 21:48:36 2026 |
| Group: Unspecified | Build host: s390x-builder01.almalinux.org |
| Size: 83243 | Source RPM: ruby-3.0.7-166.el9_7.src.rpm |
| Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
| Url: https://www.ruby-lang.org/ | |
| Summary: An interpreter of object-oriented scripting language | |
Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible.
(Ruby or BSD) and Public Domain and MIT and CC0 and zlib and UCD
* Mon Apr 27 2026 Jarek Prokop <jprokop@redhat.com> - 3.0.7-166
- Fix arbitrary code execution via deserialization bypass in ERB. (CVE-2026-41316)
Resolves: RHEL-171254
* Fri Apr 11 2025 Jarek Prokop <jprokop@redhat.com> - 3.0.7-165
- Fix Denial of Service in CGI::Cookie.parse. (CVE-2025-27219)
Resolves: RHEL-86104
- Fix ReDoS in CGI::Util#escapeElement. (CVE-2025-27220)
Resolves: RHEL-86130
* Thu Mar 06 2025 Jarek Prokop <jprokop@redhat.com> - 3.0.7-164
- Undefine GC compaction methods on ppc64le.
Resolves: RHEL-83136
- Fix printing warnings when using IRB from a script.
Resolves: RHEL-83044
* Tue Nov 26 2024 Jarek Prokop <jprokop@redhat.com> - 3.0.7-163
- Fix REXML ReDoS vulnerability. (CVE-2024-49761)
Resolves: RHEL-68525
* Tue Apr 30 2024 Jun Aruga <jaruga@redhat.com> - 3.0.7-162
- Upgrade to Ruby 3.0.7.
Resolves: RHEL-35740
- Fix HTTP response splitting in CGI.
Resolves: RHEL-35741
- Fix ReDoS vulnerability in URI.
Resolves: RHEL-35742
- Fix ReDoS vulnerability in Time.
Resolves: RHEL-35743
- Fix buffer overread vulnerability in StringIO.
Resolves: RHEL-35744
- Fix RCE vulnerability with .rdoc_options in RDoc.
Resolves: RHEL-35746
- Fix arbitrary memory address read vulnerability with Regex search.
Resolves: RHEL-35747
/usr/bin/erb /usr/bin/ruby /usr/lib/.build-id /usr/lib/.build-id/9d /usr/lib/.build-id/9d/c094065700a36ef17d36b6c5729455f0e09559 /usr/share/licenses/ruby /usr/share/licenses/ruby/BSDL /usr/share/licenses/ruby/COPYING /usr/share/licenses/ruby/COPYING.ja /usr/share/licenses/ruby/GPL /usr/share/licenses/ruby/LEGAL /usr/share/man/man1/erb.1.gz /usr/share/man/man1/ruby.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu May 21 06:14:07 2026